Secure Shell (SSH) is an essential protocol within the landscape of cybersecurity. It was designed to provide a secure method of accessing networked resources, offering an encrypted alternative to the traditionally insecure... Read More
Software piracy, in terms of the cybersecurity context and antivirus, refers to the illegal copying, sharing, or using of software without the required permission from the copyright holder. It is a derogatory activity that... Read More
Symmetric encryption, also known as private-key encryption or secret key cryptography, is a type of encryption where one key is used for both encryption and decryption of the data. The term "symmetric" denotes the use of the same... Read More
Spyware is a specific type of malicious software (malware) that infiltrates computer systems without the user's knowledge or consent with the prime intent of stealing sensitive data, tracking user activities, and generating... Read More
There exists an essential tool termed as the "Sandbox Environment." To understand this concept, think of a physical sandbox that children play in: a secured, contained space, where one can play, experiment, make anything or... Read More
Steganography, derived from the Greek words ‘steganos’ meaning covered or secret, and ‘graphein’ pertaining to writing, is the art and science of concealing information within other non-secret text or data. What... Read More
Signature-based detection is a conventional methodology used extensively in cyber security systems to protect computers and networks from harmful cyber threats. This detection technique forms the foundation for most antivirus... Read More
Shellcode is a crucial concept in cybersecurity parlance. Pertaining to the realm of computer programming and information security, it refers to a small piece of code used as the payload in the exploitation of a software... Read More
Server Message Block or SMB is a protocol predominantly used by Windows operating systems, which enables systems within the same network to share files. It is also used by other operating systems like Linux through SAMBA. Over... Read More
Steganography-based malware has become a major concern in the field of cybersecurity. Steganography, a Greek term that translates to "covered writing", has been practised for centuries as a means of hiding secret messages within... Read More
SMS Trojans are malicious software that infiltrate mobile devices, typically smartphones and tablets. They cloak themselves to appear as seemingly harmless applications, and once downloaded, gather user data or provide... Read More
Social engineering malware represents one of the most potent threats in the current cybersecurity landscape. In this context, it refers to the malicious software or programs designed by cybercriminals with an intention to... Read More
The term "signature" holds a particularly significant meaning. While in common parlance, a signature usually refers to the unique, handwritten inscription an individual traces at the end of a document to authenticate it, in the... Read More
SSL/TLS, also known as Secure Sockets Layer and Transport Layer Security respectively, are cryptographic protocols designed with the primary aim of maintaining security over networks, specifically, internet communication. They... Read More
The SSL/TLS Certificate is an essential constituent in the domain of cybersecurity and antivirus. These certificates form an integral aspect of secure and safe online browsing, enhancing the integrity of web-based platforms,... Read More
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are common security protocols used to secure internet communications. These protocols help increase the security of internet communications by verifying the parties... Read More
The SSL/TLS protocol version, within the context of cybersecurity and antivirus measures, refers to two cryptographic protocols used to provide secure communication over a computer network. These variants, named Secure Socket... Read More
Secure Sockets Layer (SSL) is a protocol employed in the domain of cybersecurity and anti-virus initiatives to establish an encrypted link between a server and a client, such as a web server and a browser, or a mail server and a... Read More
Secure Shell, better known as SSH, is a network protocol that provides system administrators with a secure way to access a computer over an unsecured network. It provides the strength encryption needed to handle confidential data... Read More
Shoulder surfing is a popular and common term used in the realm of cybersecurity. It refers to the act of an attacker secretly spying over someone's shoulder to catch valuable and confidential information. Shoulder surfer may be... Read More
| A | | | B | | | C | | | D | | | E | | | F | | | G | | | H | | | I | | | J | | | K | | | L | | | M | |
| N | | | O | | | P | | | Q | | | R | | | S | | | T | | | U | | | V | | | W | | | X | | | Y | | | Z | |
| 1 | | | 2 | | | 3 | | | 4 | | | 7 | | | 8 | |